Fig. 3From: Risk management-based security evaluation model for telemedicine systemsTelemedicine home networkBack to article page